원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.6 No.2
2012.04
pp.385-390
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
We present a scalable and accurate method for classifying program traces to detect system intrusion attempts. By employing inter-element dependency models to overcome the independence violation problem inherent in the Naïve Bayes learners, our method yields intrusion detectors with better accuracy. For efficient counting of n-gram features without losing accuracy, we use a k-truncated generalized suffix tree (k-TGST) for storing n-gram features. The k-TGST storage mechanism enables to scale up the classifiers, which cannot be easily achieved by SVM (Support Vector Machine) based methods that require implausible computing power and resources for accuracy.
목차
Abstract
1. Introduction
2. Method
2.1. Inter-Dependency Models of n-Grams (IM(n))
2.2. k-Truncated Suffix Tree
3. Conclusion
Acknowledgements
References
1. Introduction
2. Method
2.1. Inter-Dependency Models of n-Grams (IM(n))
2.2. k-Truncated Suffix Tree
3. Conclusion
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보